mhaskar
I write codes that break codes, Hacker wannabe.
Funding Links: https://github.com/sponsors/mhaskar
- Name: Askar
- Location: Between Lines
- Kind: user
- Followers: 707
- Following: 20
- Total stars: 2623
- Repositories count: 67
- Created at: 2022-11-15T18:14:15.916Z
- Updated at: 2025-03-27T22:39:50.065Z
- Last synced at: 2025-03-27T22:39:50.065Z
GitHub Sponsors Profile
Hello! This is Askar, I'm a wannabe hacker who creates codes that break codes.
I spend my time building stuff that helps pentesters and red teamers to hack the planet such as DNSStager and Octopus C2.
Also, I was helping a lot of open source products by discovering and responsibility disclose critical vulnerabilities, and share the full exploit code with the community which you can find in my Github account.
Most of this work was done in my free time and some of it was done during engaging with clients, so sponsoring my work will help to make sure that I will continuously update my work or even add some new cool projects that help you to hack the planet.
- Current Sponsors: 0
- Past Sponsors: 0
- Total Sponsors: 0
- Minimum Sponsorship: $1.00
Featured Works
mhaskar/Octopus
Open source pre-operation C2 server based on python and powershell
Language: Python - Stars: 749mhaskar/CVE-2020-8813
The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813
Language: Python - Stars: 68mhaskar/CVE-2019-20224
The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224
Language: Python - Stars: 14mhaskar/DNSStager
Hide your payload in DNS
Language: Python - Stars: 612mhaskar/CVE-2019-13024
The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024
Language: Python - Stars: 11Active Sponsors
Past Sponsors
Sponsor Breakdown
- User: 1